Ownership-based data security transaction method and system

A data security and transaction method technology, applied in the field of information security technology and data transaction, can solve problems affecting personal interests, corporate interests, social stability, national security, illegal data transactions, unclear data ownership, etc., to avoid branch transactions The effect of information loss and protection of interests

Inactive Publication Date: 2018-05-29
苗放 +2
View PDF2 Cites 13 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

In the data trading market, due to unclear data ownership and illegal data transactions, it is difficult to guarantee the distribution of data owners' interests after data transactions, resulting in damage to personal interests, corporate interests, social interests, and even national interests.
Traditional access applications use the platform to authorize permissions through passwords and other methods. Once sensitive data is leaked, it cannot be traced and held accountable, which will affect personal interests, corporate interests, social stability, and national security.

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Examples

Experimental program
Comparison scheme
Effect test

Embodiment 1

[0034] A data security transaction method based on ownership, comprising the following steps:

[0035] A. Encrypt the ownership of the data to be traded provided by the data owner;

[0036] B. Extract the characteristic information of the data to be traded, register and publish;

[0037] C. Negotiate the transaction when receiving the data transaction application and generate a transaction contract according to the content of the negotiation;

[0038] D. After the transaction payment or transaction confirmation, authorize the ownership of the data to the data applicant and record the process;

[0039] E. Record the ownership authorization process of transactions and the use process of transaction data;

[0040] F. After the transaction is successful, judge whether the data has multiple ownerships. If it is a single ownership, it will end; if there are multiple data ownerships, the benefits obtained from the data exchange will be distributed to multiple data owners according ...

Embodiment 2

[0042] Based on the principle of Embodiment 1, this embodiment refines the foregoing embodiments in detail.

[0043] A. Encrypt and store the transaction data provided by the data owner; the storage location can be selected according to the personal wishes of the data owner. In this step, the data may be data, funds or virtual currency, etc. The encryption method can be based on CA / PKI. According to the size of the data, asymmetric key algorithm can be used to encrypt data or symmetric key algorithm + asymmetric key algorithm to encrypt data. The data owner's public key is used to encrypt data, and the private key is provided by Data owner saves. Specifically, if the amount of data is small, an asymmetric key algorithm is used to encrypt the data; when the amount of data is large, the data is encrypted using a symmetric key algorithm + an asymmetric key algorithm. Such as AES combined with RSA algorithm.

[0044] B. The feature information of the transaction data is registe...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

PUM

No PUM Login to view more

Abstract

The invention discloses an ownership-based data security transaction method and system. The method comprises: ownership encryption is carried out on data provided by a data owner and the processed data are stored; a data characteristic is extracted and registration is carried out; when a transaction application is received, transaction negotiation is carried out and a transaction contract is generated based on a negotiation content; transaction payment is carried out and ownership authorization is carried out on a data applicant; data-ownership-based recording is carried out on a whole transaction process; whether the data has multiple ownerships is determined; if the data has only one ownership, the operation is ended; and if the e data has multiple ownerships, data values are allocated to a plurality of data ownerships. Data encryption and transaction are carried out based on the ownership and the ownership conversion to provide a foundation for profit distribution after data transaction; the transaction behaviors of data owners and data applicants are supported; benefits of all data obligees are guaranteed by providing the method; a problem of loss of branch transaction information realized by the block chain technology is solved; and because the transaction data are in an encryption state, the safety is high.

Description

technical field [0001] The invention relates to the fields of information security technology and data transaction, in particular to a data security transaction method and system based on ownership. Background technique [0002] With the wide application of data in economic development, social governance, market supervision and other fields, especially big data, the social and economic benefits of data are gradually emerging, and the potential for big data application and industrial development in the future is huge. If big data trading is a kind of trading behavior, big data exchange can be regarded as the operating mode, supporting entities and application scenarios of this kind of trading behavior. [0003] At present, network security has become the will of the state. How to achieve data security and data transactions with clear data responsibilities and rights has become a common concern of the whole society. In the data trading market, due to the unclear data ownershi...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

Application Information

Patent Timeline
no application Login to view more
Patent Type & Authority Applications(China)
IPC IPC(8): G06Q20/38G06Q20/40
CPCG06Q20/382G06Q20/401
Inventor 苗放解岩杨文晖
Owner 苗放
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Try Eureka
PatSnap group products